Abstract is missing.
- PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification supportVishav Vir Singh. 1-6
- A robust image watermarking method to geometric attacksKosuke Okada, Shigeo Wada. 7-12
- Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systemsJoon Son, Jim Alves-Foss. 13-18
- Security analysis of a large-scale voting schemeSigurd Eskeland. 19-21
- A grey-level image watermarking method based on block DCT and statistic correlation adjustmentCharlie Obimbo, JingBo Ni. 22-27
- An efficient authentication scheme for contactless smartcards using elliptic curve cryptographyDiomedes D. Kastanis, Ioannis G. Askoxylakis, Apostolos Traganitis. 28-33
- Proactive, content-aware, sensitive data protection framework for enterprisesYuan Zhang, Richard J. Enbody, John R. Lloyd. 34-40
- Slantlet transform-based image fingerprintsLongjiang Yu, Sheng-He Sun. 41-43
- A multi-bitwatermark generation algorithm with properties of error correctionBehzad Salami, Charlie Obimbo. 44-49
- Elliptic curve and password based dynamic key agreement in wireless ad-hoc networksIoannis G. Askoxylakis, Diomedes D. Kastanis, Apostolos Traganitis. 50-60
- A petri net based XML firewall security model for web services invocationMihir M. Ayachit, Haiping Xu. 61-67
- A method for deriving paths across a distributedweb of trustPaul Tipper, Christopher Edwards. 68-73
- Designing SSL/TLS protocol for resource constrained devicesAsad M. Ali. 74-80
- Security framework for supervisory control and data acquisition, automation systems, and networksCharlie Obombo, Fardeen Haji, Larry Lindsay, Darshana Patel. 81-86
- Object authentication in closed containers by ultra-wideband multipath profile examination: An application to national securitySylwester Sobolewski, R. Michael Buehrer. 87-92
- Self-organising quorum systems for ad hoc networksGareth Owen, Mo Adda. 93-98
- Access control by secure multi-party EPR decryption in the medical scenarioSigurd Eskeland. 99-103
- The lightweight key management protocol (LKMP)Jonathan T. Trostle. 104-112
- Artificial immune using multi-level negative selection approach to anomaly detectionAliaa A. A. Youssif, Atef Z. Ghalwash, Samir Mohamed. 113-118
- Reinforcement of privacy in 802.16 MAC common part sublayer using the principle of circularityR. Bhakthavathsalam. 119-125
- An MSLS-EMM for enforcing confidentiality in malicious environmentsBei Wang, Jim Alves-Foss. 126-131
- A classification of security patterns for the transactions between a requester, an intermediary, and a web-serviceJaime Muñoz Arteaga, Ricardo Mendoza González, Francisco J. Álvarez, Miguel Vargas Martin. 132-137
- Security vulnerability categories in major software systemsOmar H. Alhazmi, Sung-Whan Woo, Yashwant K. Malaiya. 138-143
- ARP and ICMP weaknesses: Impact and network performance analysis of a novel attack strategyAshish Anand, Rahul Rishi, Mukesh Kumar. 144-149
- STRBAC - An approach towards spatio-temporal role-based access controlMahendra Kumar, Richard E. Newman. 150-155
- Experimental evaluation of network security through a hierarchical quantitative metrics modelF. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy. 156-164
- Securing a Linux-based multi-user web serverMarco Prandini. 165-171
- Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systemsHiroshi Fujinoki, Ravi Kumar Boyapati. 172-178
- A scalable approach to IP anycast securityAbhinav Pathak, Dheeraj Sanghi. 179-184
- An efficient hybrid algorithm for multidimensional packet classificationYaxuan Qi, Jun Li. 185-190
- Introducing trusted EAP module for security enhancement in WLANs and VPNsPascal Urien, Mesmin Dandjinou, Mohamad Badra. 191-198
- Optimizing multi-thread string matching for network processor based intrusion management systemJianming Yu, Quan Huang, Yibo Xue. 199-204
- Dynamically blocking access to web pages for spammers harvestersTobias Eggendorfer, Jörg Keller. 205-210
- Design of a virtual computer security labJörg Keller, Ralf Naues. 211-215
- Towards effective packet classificationYaxuan Qi, Jun Li. 216-223
- Access control platform for submitted jobs in computational grid environmentLeonardo Mattes, João Antonio Zuffo. 224-229